Analysis

  • max time kernel
    53s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 07:48

General

  • Target

    822bd10acf6de2543cc31717de001fda9ed665d1d515eadb4903a05319d08e84.exe

  • Size

    683KB

  • MD5

    f5ac9245e5c5816ef71ec76a98492b99

  • SHA1

    2ffefd23cf8c0f6b017c64f91fc6ec9a1a3f99a0

  • SHA256

    822bd10acf6de2543cc31717de001fda9ed665d1d515eadb4903a05319d08e84

  • SHA512

    6d942c0fb437e0c45f638804c13da7b22d5b843f45211c22f2619acd64dd84ebba6462707bff39d9e2a5511d7b2497cacc12d95aba02a855eed08d6849024f30

  • SSDEEP

    12288:tMrUy90G4FErcxsujr7LW/TGmRs4LlYCNPJjmsUupmZs3SqNZjE:FyEFLxsujnoTGd4RYC75TmZsCuq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\822bd10acf6de2543cc31717de001fda9ed665d1d515eadb4903a05319d08e84.exe
    "C:\Users\Admin\AppData\Local\Temp\822bd10acf6de2543cc31717de001fda9ed665d1d515eadb4903a05319d08e84.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un464822.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un464822.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9131.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9131.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0158.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0158.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4800
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si679734.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si679734.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3076

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si679734.exe
    Filesize

    175KB

    MD5

    59422a7c28a81ba7669d57e201738431

    SHA1

    dff0d602bcf944abb3b7a7789d2822bc84f05836

    SHA256

    ecb8ee200eeaa424e73fe6b887242368297b4b57705d0d418e5035f7736a4187

    SHA512

    c9b5658e59667ba5b2de749ff27e6f1a9fd63a6b76b8b2b36fd2e2d6673f2b53657df63a832bbfe1885c84ed28ba6526c3961597c0cc82ee9fd30d6ed2e981cb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si679734.exe
    Filesize

    175KB

    MD5

    59422a7c28a81ba7669d57e201738431

    SHA1

    dff0d602bcf944abb3b7a7789d2822bc84f05836

    SHA256

    ecb8ee200eeaa424e73fe6b887242368297b4b57705d0d418e5035f7736a4187

    SHA512

    c9b5658e59667ba5b2de749ff27e6f1a9fd63a6b76b8b2b36fd2e2d6673f2b53657df63a832bbfe1885c84ed28ba6526c3961597c0cc82ee9fd30d6ed2e981cb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un464822.exe
    Filesize

    542KB

    MD5

    6b8d0c15e2d237656e17a158d84af1c3

    SHA1

    0a97825dd46c3d33a8fe1aa43b48b47310c02811

    SHA256

    e08d890961833d4270640190808dd47b395b8de86c8c371023403fab64612623

    SHA512

    d285f67c48c02720e02fd01b48c82b51ded1b2af04fde1d2599cccf27f672699247b3003e9e4a58dc9fc8ea5dabe43bc894b05f8fad4b39d4011343e65566852

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un464822.exe
    Filesize

    542KB

    MD5

    6b8d0c15e2d237656e17a158d84af1c3

    SHA1

    0a97825dd46c3d33a8fe1aa43b48b47310c02811

    SHA256

    e08d890961833d4270640190808dd47b395b8de86c8c371023403fab64612623

    SHA512

    d285f67c48c02720e02fd01b48c82b51ded1b2af04fde1d2599cccf27f672699247b3003e9e4a58dc9fc8ea5dabe43bc894b05f8fad4b39d4011343e65566852

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9131.exe
    Filesize

    321KB

    MD5

    ec4d99132e00e3bc2a83064830ca303d

    SHA1

    1a00681e83521aa63badea0ef9542e684ac83f2f

    SHA256

    4463671222e08668b14c4cef816f595f5fc319b8c626d5257b77852734416a23

    SHA512

    e9719d9fc4e6f0c2fbc3af043a18cb9f9ebf384cd5d8fad82aaf031ad7777ca806efa1d4407ff884fb4ee44aacafd91e993a2333daa41bcd188d7ca36931cbc9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9131.exe
    Filesize

    321KB

    MD5

    ec4d99132e00e3bc2a83064830ca303d

    SHA1

    1a00681e83521aa63badea0ef9542e684ac83f2f

    SHA256

    4463671222e08668b14c4cef816f595f5fc319b8c626d5257b77852734416a23

    SHA512

    e9719d9fc4e6f0c2fbc3af043a18cb9f9ebf384cd5d8fad82aaf031ad7777ca806efa1d4407ff884fb4ee44aacafd91e993a2333daa41bcd188d7ca36931cbc9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0158.exe
    Filesize

    380KB

    MD5

    0b03765d3e2b3618036dde4fb2ec0b9e

    SHA1

    fcbe019d15abed6fb66fb31ab5a19b57910c1e5c

    SHA256

    b546e7c1056160d0b673251d87953cb4997139a813b385d90e477706c3b83fcf

    SHA512

    e94aba5487be1b74e6631455a4455bf6da92172659a2a1853c108d251085a8296865b907f8243aae336a2cb60f1f49845afa4c660b5627609033b6c6ce8fbbe6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0158.exe
    Filesize

    380KB

    MD5

    0b03765d3e2b3618036dde4fb2ec0b9e

    SHA1

    fcbe019d15abed6fb66fb31ab5a19b57910c1e5c

    SHA256

    b546e7c1056160d0b673251d87953cb4997139a813b385d90e477706c3b83fcf

    SHA512

    e94aba5487be1b74e6631455a4455bf6da92172659a2a1853c108d251085a8296865b907f8243aae336a2cb60f1f49845afa4c660b5627609033b6c6ce8fbbe6

  • memory/3076-1112-0x0000000004F80000-0x0000000004F90000-memory.dmp
    Filesize

    64KB

  • memory/3076-1111-0x0000000004C30000-0x0000000004C7B000-memory.dmp
    Filesize

    300KB

  • memory/3076-1110-0x0000000000360000-0x0000000000392000-memory.dmp
    Filesize

    200KB

  • memory/4800-1088-0x0000000007E50000-0x0000000008456000-memory.dmp
    Filesize

    6.0MB

  • memory/4800-1091-0x00000000079C0000-0x00000000079FE000-memory.dmp
    Filesize

    248KB

  • memory/4800-1104-0x0000000007230000-0x0000000007240000-memory.dmp
    Filesize

    64KB

  • memory/4800-1103-0x0000000009560000-0x00000000095B0000-memory.dmp
    Filesize

    320KB

  • memory/4800-1102-0x00000000094E0000-0x0000000009556000-memory.dmp
    Filesize

    472KB

  • memory/4800-1101-0x0000000008E80000-0x00000000093AC000-memory.dmp
    Filesize

    5.2MB

  • memory/4800-1100-0x0000000008CA0000-0x0000000008E62000-memory.dmp
    Filesize

    1.8MB

  • memory/4800-1099-0x0000000007230000-0x0000000007240000-memory.dmp
    Filesize

    64KB

  • memory/4800-1098-0x0000000007230000-0x0000000007240000-memory.dmp
    Filesize

    64KB

  • memory/4800-1097-0x0000000007230000-0x0000000007240000-memory.dmp
    Filesize

    64KB

  • memory/4800-1095-0x0000000007D40000-0x0000000007DA6000-memory.dmp
    Filesize

    408KB

  • memory/4800-1094-0x0000000007CA0000-0x0000000007D32000-memory.dmp
    Filesize

    584KB

  • memory/4800-1093-0x0000000007230000-0x0000000007240000-memory.dmp
    Filesize

    64KB

  • memory/4800-1092-0x0000000007B10000-0x0000000007B5B000-memory.dmp
    Filesize

    300KB

  • memory/4800-1090-0x00000000079A0000-0x00000000079B2000-memory.dmp
    Filesize

    72KB

  • memory/4800-1089-0x0000000007860000-0x000000000796A000-memory.dmp
    Filesize

    1.0MB

  • memory/4800-407-0x0000000007230000-0x0000000007240000-memory.dmp
    Filesize

    64KB

  • memory/4800-405-0x0000000007230000-0x0000000007240000-memory.dmp
    Filesize

    64KB

  • memory/4800-401-0x0000000002CB0000-0x0000000002CFB000-memory.dmp
    Filesize

    300KB

  • memory/4800-176-0x0000000004C30000-0x0000000004C76000-memory.dmp
    Filesize

    280KB

  • memory/4800-177-0x0000000007120000-0x0000000007164000-memory.dmp
    Filesize

    272KB

  • memory/4800-179-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-178-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-181-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-183-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-185-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-187-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-189-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-191-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-193-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-195-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-197-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-199-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-201-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-203-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-205-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-207-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-209-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-211-0x0000000007120000-0x000000000715F000-memory.dmp
    Filesize

    252KB

  • memory/4800-403-0x0000000007230000-0x0000000007240000-memory.dmp
    Filesize

    64KB

  • memory/4920-159-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-136-0x00000000072E0000-0x00000000077DE000-memory.dmp
    Filesize

    5.0MB

  • memory/4920-171-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/4920-139-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-169-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/4920-168-0x00000000072D0000-0x00000000072E0000-memory.dmp
    Filesize

    64KB

  • memory/4920-145-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-167-0x00000000072D0000-0x00000000072E0000-memory.dmp
    Filesize

    64KB

  • memory/4920-166-0x00000000072D0000-0x00000000072E0000-memory.dmp
    Filesize

    64KB

  • memory/4920-165-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-134-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/4920-143-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-155-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-157-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-141-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-153-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-151-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-149-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-147-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-138-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-137-0x0000000004A30000-0x0000000004A48000-memory.dmp
    Filesize

    96KB

  • memory/4920-161-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB

  • memory/4920-135-0x00000000048A0000-0x00000000048BA000-memory.dmp
    Filesize

    104KB

  • memory/4920-163-0x0000000004A30000-0x0000000004A42000-memory.dmp
    Filesize

    72KB